Which of the following is not considered an accessibility utility?
a. System Restore
b. Magnifier
c. Narrator
d. Speech Recognition
A
Computer Science & Information Technology
You might also like to view...
Which of the following type of hackers will report a vulnerability when they find it?
a. White hat b. Gray hat c. Green hat d. Black hat
Computer Science & Information Technology
Which of the following is considered cardholder data?
A) Service code B) Full magnetic stripe data C) Security code D) PIN
Computer Science & Information Technology